ŠĻą”±į>ž’ Z\ž’’’Y’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’ģ„Į!` šæ bjbj\­\­ .8>Ē>Ē’’’’’’¤ŠŠŠŠŠŠŠäl/l/l/l/ˆ/<ä“B2Š/Š/Š/Š/Š/«0«0«0BBBBBBB$ÅCh-Fœ8BŠ«0«0«0«0«08BŠŠŠ/Š/ŪMBq2q2q2«0ŹŠŠ/ŠŠ/Bq2«0Bq2q2Ž`@hŠŠœAŠ/Ä/ `ļ}³¹Él/u1‚Č@öAcB0“BŲ@ÄÉF÷1dÉF œAœA&ÉFŠĀA4«0«0q2«0«0«0«0«08B8B[2«0«0«0“B«0«0«0«0ä䤈äl/ääˆl/ää䊊ŠŠŠŠ’’’’ CS5493 Assignment: Write A Deployment Plan for… The purpose of this assignment is to write a deployment plan for a portable notebook computer. Create a fictitious medical supply company name, and address. Notebook computers might be configured differently depending on who is issued the computer. Notebook-computers are used by employees who travel or telecommute. The OS required is MS Windows XP or Vista (your choice). Assume the following about the company All employees have a supervisor except the CEO. There is a Director of Systems Administration. There is a staff of computer technicians to configure systems. Technicians report to the Director of Systems Administration. Employees require access to the following software Cisco VPN client MS Office – MS Outlook (for e-mail) or any other email reader. A browser is used for accessing online information available to customers. Write a computer deployment plan for a portable notebook computer. Consult the text (J. Allen), your class notes, and any other appropriate sources. Include a cover/title page and a table of contents. The attached worksheet is simply a resource and may be used for this assignment. Workstation Deployment Policy Worksheet Tech Services, Inc. SA/Technician must record bar-codes or serial numbers for any and all deployed hardware. Equipment Installation Inventory Description Bar Code/SN CPU-box ______________________________ _________ Manufacturer _________ Model number _________ Memory size _________CPU (type/rating) _________ Disk capacity Terminal ______________________________ _________ Manufacturer _________ Dimensions Keyboard ______________________________ Mouse Printer Speakers Cables UPS/Surge protector Graphics card Other (external drives, Fax, Scanner, … ) An accurate record of the deployed system location is required. If the user is receiving an upgrade, it may be necessary to migrate previous data to the new system. Destination Migration from user’s Previous System User name Address Address Office number Office number Phone Phone e-mail e-mail Supervisor Bar Code/SN Initial Request Date Deployment Date (by) ______ Check for User Computer Systems Access Agreement ______ Disclosure of Services Agreement Identify the OS name, version, and most current update information for the installed OS. Operating System Installation OS Name and Version OS Installation Disk ID: OS checklist SP version Additional Updates version and date OS Updates Configuration _____ Boot Password (yes or no) _____ Setup Password (yes or no) _____ Disk Password (yes or no) _____ etc. OS Configuration ________Configure Windows Update for auto-update scheduled @ 2:00am weekly/nightly OS Startup editing using AutoRuns: list disabled startups here: Driver Installation List: list additional drivers not included with the OS install. Driver Removal List : Use AutoRuns to disable the following drivers Windows System Restore. Flush any existing restore points upon installation. Make new System Restore Point Disable Auto-Run on DVD/CD drives. Configure to show file extensions On your desktop, open My Computer. If you don't see My Computer, then open any folder. Select the Tools menu, & then select Folder Options .... In the Folder Options windows, click on the View tab. Uncheck the box next to Hide file extensions for known file types Click OK Start the Event Log (view with the Event Viewer): Type: sc start EventLog from a cmd window. Run: secpol.msc the Set all 9 categories to record failures Record success for: policy change, process tracking, system events. Test security configuration against the security template. User Configuration _______Create User Account User ID _____________ Password (yes or no) _____________ Set access privilege for user _____________ (access type) List user requested applications: Application Installed Updates Windows Office x x FireFox x x Windows Media Player x x Outlook(e-mail) x x IE Browser configuration Disable or “prompt for action” on all ActiveX, Java, and JavaScript options. Add Trusted sites: http://surfthenetsafely.com/ieseczone7.htm Disable Auto-complete (consider using SiteAdvisor) Include special configuration instructions for security software. Security Software Application Updated Activated Anti-Virus McAfee x x Anti-Spy/Adware AdAware x x Firewall Comodo(firewall) x x Windows Firewall off Other WinPatrol x x Glary Tools x x WinSCP x x Putty configure to use ssh port. (Key logger) OS Registry Configuration Run registry cleaner Flush and make a new restore point for Windows System Restore Backup registry Checksum registry backup Encrypt the backup and checksum. Copy registry backup and its checksum to WROM. Disk Maintenance Run disk cleanup De-fragment disk in safe mode. Make full ISO image backup of the disk. Record the checksum of the ISO image. Physical Security Checklist ______ Cabinet intrusion lock: ______ Cabinet security lock/cable: ______ Terminal lock/cable: ______ Privacy screen ______ Tamper detection ______ Other, specify details: Attaching to the network is the last step in the deployment. Networking Procedure check. All must be checked before connecting to the internal network. _______ OS is up to date _______ Security software is up to date _______ Signature approval for deployment _______ Passworded _______ Physical Security in place System MAC Address Logical network type Machine DNS Name Machine DNS Suffix IP address Gateway Subnet Network software VPN- client Network Passwording MS Active Directory NIS (Network Information Service) LDAP (Lightweight Directory Access Protocol) Include details about special instructions for this particular system. Other Special Instructions: Backup schedule for system. When the system is deployed and configured by the SA-staff; and accepted by the end user. Installation Completion Approval Signatures Name Signature SA/Technician SA/Tech Staff Supervisor User 0L^‘’˜¦µŠ¬ ½ ż /  D _ “ ” — ć ; < y µģbr€„•§µ –žČÖ†‘ÓŲķ-1PyzśöņöėöėöėēņēćēßŪņŪŌĻēČĻēĻēĄĻĄēøē°ē«°ē°ē°ē„ē„ē„œē„ē„ē„h“ßh¢Wł0J5\h¢Wł0J5\ h¢Wł0J h¢Wł6hčTµh¢Wł6hÆV€h¢Wł5h+wĀh¢Wł5 h“Vh¢Wł h¢Wł5 hrUjh¢Włh+chõqxhk@eh¢Wł hrUjh\f h DBh\f h\f 5601‘’Š, p © Š / ¬ ß š ż 0 {  D • — ā ć < ] żżżżõõõõõķķķķååååõõõżżżÜż„Š^„Šgd¢Wł & Fgd¢Wł & Fgd¢Wł & Fgd¢Wł ż] y ¤ ¼ Ō ė Jbx¤Ŗ²»ĀÖäµėś/AöööööééöööööööööööēöēēŽēē„Š`„Šgd¢Wł „Š„Š^„Š`„Šgd¢Wł„Š^„Šgd¢WłAUq‹¢Ūb€•²ĄŃ÷4Uu€‚„•čżżżżżżżżōżżżżżżżżēēēżżŽÖ & Fgd¢Wł„h^„hgd¢Wł „Š„Š^„Š`„Šgd¢Wł„Š^„Šgd¢Włč(|ĄŲ +NpČ8zƒµąōaœ°ĖäB÷÷÷÷ļļ÷÷ļļļļļ÷ļļēēߌŚ÷ļļļgd¢Wł & Fgd¢Wł & Fgd¢Wł & Fgd¢Wł & Fgd¢Włz‚ƒ»ĢŌ×åļÆ°öżV€ł!,-%(? š›®Ä§±³õļćßÓßĖßæß·°ßØßأߜߗ—ˆß€—ßx—ßqßi—ßa—h;5£h¢Wł5h;Ćh¢Wł5 h.ah¢Włh.ah¢Wł5hÓxÉh¢Wł5 hlu>h¢Włh_0h¢Wł5 h¢Wł5 h[h‹h¢Wł h¢Wł6håC,h¢Wł6 hh#^h¢WłhkHÓh¢Wł5h}SQh¢Wł5OJQJhŠ,h¢Wł6hŠ,h¢Wł5OJQJh¢Włh©bĖh¢Wł0J5\ h¢Wł0Jh“ßh¢Wł0J5&Bd…›«ĘŻöC—“¶ł-Ii‹§ĮŲź$%?÷īęęęę÷ęęęęŻŪŪŪŪŪŪŪŪŪŪŪŪŪ„h^„hgd¢Wł & Fgd¢Wł„ ^„ gd¢Wł & Fgd¢Wł?T’¢»Ü  .M›¼Ü2Jij§²H÷÷÷÷÷÷õõķķķõõõäŪŪŪŪŪŪõõõõ„Š^„Šgd¢Wł„Š`„Šgd¢Wł & Fgd¢Wł & Fgd¢Wł³Ād­®9:;–­Ö  łõłšéõéõįšŚšÓõĖšõÄ hįZ®h¢WłhįZ®h¢Wł5 h]:h¢Wł hÄ:†h¢Włh¶ Łh¢Wł5 h¶ Łh¢Wł h¢Wł5h¢Wł hlu>h¢WłHt‰®ĀŲźž -;PfŠ¹ŗ;<–Õäž żżżżżżżżżżżżżżżżżżżżżōżżżż„Š^„Šgd¢Wł,1h°Š/ °ą=!°"°# $ %°°Š°Š Š†œ@@ń’@ NormalCJ_HaJmH sH tH DA@ņ’”D Default Paragraph FontRió’³R  Table Normalö4Ö l4Öaö (kō’Į(No List *W@¢ń* “ßStrong5\8’’’’01‘’Š,p©Š/¬ßšż0{•—āć<]y¤¼ŌėJbx¤Ŗ²»ĀÖäµėś/AUq‹¢Ū   b € • ² Ą Ń ÷  4 U u € ‚ „ • č ( | Ą Ų + N p Č  8 z ƒ µ ą ō aœ°ĖäBd…›«ĘŻöC—“¶ł-Ii‹§ĮŲź$%?T’¢»Ü  .M›¼Ü2Jij§²Ht‰®ĀŲźž -;PfŠ¹ŗ;<–Õ䞘0€€Ą˜0€€Ąš0€€Ą˜0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0ń€Ą˜ 0ń€Ą˜ 0ń€Ąš 0ń€Ą˜ 0ō€Ą˜ 0ō€Ąš 0ō€Ą˜ 0ō€Ąš0€€Ą˜0€€Ą˜0€€Ą˜0€€Ąš0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜0€€Ą˜0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜0€€Ą˜0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą˜0€€Ą01‘’Š,p©Š/¬ßšż0{D•—āć<]y¤¼ŌėJbx¤Ŗ²»ĀÖäµėś/AUq‹¢Ū   b € • ² Ą Ń ÷  4 U u € ‚ „ • č ( | Ą Ų + N p Č  8 z ƒ µ ą ō aœ°ĖäBd…›«ĘŻöC—“¶ł-Ii‹§ĮŲź$%?T’¢»Ü  .M›¼Ü2Jij§²Ht‰®ĀŲźž -;PfŠ¹ŗ;<–Õ䞘0€€Ą˜0€€Ą˜0€€˜0€€Ą˜ 0€€Ą˜ 0€€€˜ 0€€Ą˜ 0€€Ą˜ 0€€Ą˜ 0©€Ą˜ 0©€Ą˜ 0©€Ą˜ 0©€€˜ 0¬€Ą˜ 0¬€Ą˜ 0¬€€˜ 0¬€Ą˜ 0€€€˜ 0€€˜ 0€€˜0€€ų˜0€€ų˜0€€ų˜0€€˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜0€€ų˜0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜0€€ų˜0€€ų˜ 0€€ų˜ 0€€ų˜ 0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ų˜0€€ųz³ ] AčB?H  š8š@ń’’’€€€÷š’šš0š( š ššB šS šæĖ’ ?š:B – ž Ä Ģ Ō × å ļ ›¢§²SY[bu{±ŗŻć ~ˆDOD  BH{ ~ ō ł u|÷QV:333333333]^¬µ½½/”ćć:B?[Ō“$’’’’’’’’’w ¶xüN’’’’’’’’’“ ©!ŗš£’’’’’’’’’S5.œu؟’’’’’’’’’Tg`¢Žž ’’’’’’’’’h„Š„˜žĘŠ^„Š`„˜žOJQJo(‡hˆH·šh„ „˜žĘ ^„ `„˜žOJQJ^Jo(‡hˆHoh„p„˜žĘp^„p`„˜žOJQJo(‡hˆH§šh„@ „˜žĘ@ ^„@ `„˜žOJQJo(‡hˆH·šh„„˜žĘ^„`„˜žOJQJ^Jo(‡hˆHoh„ą„˜žĘą^„ą`„˜žOJQJo(‡hˆH§šh„°„˜žĘ°^„°`„˜žOJQJo(‡hˆH·šh„€„˜žĘ€^„€`„˜žOJQJ^Jo(‡hˆHoh„P„˜žĘP^„P`„˜žOJQJo(‡hˆH§šh„Š„˜žĘŠ^„Š`„˜žOJQJo(‡hˆH·šh„ „˜žĘ ^„ `„˜žOJQJ^Jo(‡hˆHoh„p„˜žĘp^„p`„˜žOJQJo(‡hˆH§šh„@ „˜žĘ@ ^„@ `„˜žOJQJo(‡hˆH·šh„„˜žĘ^„`„˜žOJQJ^Jo(‡hˆHoh„ą„˜žĘą^„ą`„˜žOJQJo(‡hˆH§šh„°„˜žĘ°^„°`„˜žOJQJo(‡hˆH·šh„€„˜žĘ€^„€`„˜žOJQJ^Jo(‡hˆHoh„P„˜žĘP^„P`„˜žOJQJo(‡hˆH§š„Š„˜žĘŠ^„Š`„˜žo(. „ „˜žĘ ^„ `„˜ž‡hˆH. „p„L’Ęp^„p`„L’‡hˆH. „@ „˜žĘ@ ^„@ `„˜ž‡hˆH.€ „„˜žĘ^„`„˜ž‡hˆH.‚ „ą„L’Ęą^„ą`„L’‡hˆH.€ „°„˜žĘ°^„°`„˜ž‡hˆH.€ „€„˜žĘ€^„€`„˜ž‡hˆH.‚ „P„L’ĘP^„P`„L’‡hˆH.h„Š„˜žĘŠ^„Š`„˜žOJQJo(‡hˆH·šh„ „˜žĘ ^„ `„˜žOJQJ^Jo(‡hˆHoh„p„˜žĘp^„p`„˜žOJQJo(‡hˆH§šh„@ „˜žĘ@ ^„@ `„˜žOJQJo(‡hˆH·šh„„˜žĘ^„`„˜žOJQJ^Jo(‡hˆHoh„ą„˜žĘą^„ą`„˜žOJQJo(‡hˆH§šh„°„˜žĘ°^„°`„˜žOJQJo(‡hˆH·šh„€„˜žĘ€^„€`„˜žOJQJ^Jo(‡hˆHoh„P„˜žĘP^„P`„˜žOJQJo(‡hˆH§šh„Š„˜žĘŠ^„Š`„˜žOJQJo(‡hˆH·šh„ „˜žĘ ^„ `„˜žOJQJ^Jo(‡hˆHoh„p„˜žĘp^„p`„˜žOJQJo(‡hˆH§šh„@ „˜žĘ@ ^„@ `„˜žOJQJo(‡hˆH·šh„„˜žĘ^„`„˜žOJQJ^Jo(‡hˆHoh„ą„˜žĘą^„ą`„˜žOJQJo(‡hˆH§šh„°„˜žĘ°^„°`„˜žOJQJo(‡hˆH·šh„€„˜žĘ€^„€`„˜žOJQJ^Jo(‡hˆHoh„P„˜žĘP^„P`„˜žOJQJo(‡hˆH§š?[w Tg`S5.“ ©!’’’’’’’’’’’’’’’’’’’’’’’’                                             ;šV«†^å+c\f DBk@eõqx¢WłĢžDć9¦’@€CC¤_ CCP@’’Unknown’’’’’’’’’’’’G‡z €’Times New Roman5€Symbol3& ‡z €’Arial?5 ‡z €’Courier New;€Wingdings"qˆšŠhR„ÉFÓ»ÉFX•o +•o +$š„Ą““24dųų 2ƒQšüżHX)š’?ä’’’’’’’’’’’’’’’’’’’’’ N2’’Workstation Deployment PlanJames ChildressJames Childress      ž’ą…ŸņłOh«‘+'³Ł0”˜¼Čąģų  $0 P \ ht|„ŒäWorkstation Deployment PlanJames Childress Normal.dotJames Childress22Microsoft Office Word@ K @ÜJÉ@’.¹É•ož’ÕĶ՜.“—+,ł®0 hpŒ”œ¤ ¬“¼Ä Ģ ōäUniversity of Tulsa+ ųØ Workstation Deployment Plan Title ž’’’ !"#$ž’’’&'()*+,-./0123456789:;<=>?@ABCDEFGHž’’’JKLMNOPž’’’RSTUVWXž’’’ż’’’[ž’’’ž’’’ž’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’Root Entry’’’’’’’’ ĄF``€³¹É]€Data ’’’’’’’’’’’’1Table’’’’%éFWordDocument’’’’.8SummaryInformation(’’’’’’’’’’’’IDocumentSummaryInformation8’’’’’’’’QCompObj’’’’’’’’’’’’q’’’’’’’’’’’’ž’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’ž’ ’’’’ ĄFMicrosoft Office Word Document MSWordDocWord.Document.8ō9²q